US8844023B2 - Password protected built-in test mode for memories - Google Patents

Password protected built-in test mode for memories Download PDF

Info

Publication number
US8844023B2
US8844023B2 US12/326,165 US32616508A US8844023B2 US 8844023 B2 US8844023 B2 US 8844023B2 US 32616508 A US32616508 A US 32616508A US 8844023 B2 US8844023 B2 US 8844023B2
Authority
US
United States
Prior art keywords
test mode
password
memory
built
random number
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active, expires
Application number
US12/326,165
Other versions
US20100138915A1 (en
Inventor
Antonino La Malfa
Marco Messina
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
US Bank NA
Original Assignee
Micron Technology Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to US12/326,165 priority Critical patent/US8844023B2/en
Application filed by Micron Technology Inc filed Critical Micron Technology Inc
Publication of US20100138915A1 publication Critical patent/US20100138915A1/en
Assigned to NUMONYX B.V. reassignment NUMONYX B.V. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: LA MALFA, ANTONINO, MESSINA, MARCO
Assigned to MICRON TECHNOLOGY, INC. reassignment MICRON TECHNOLOGY, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: NUMONYX B.V.
Assigned to MICRON TECHNOLOGY, INC. reassignment MICRON TECHNOLOGY, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: NUMONYX B.V.
Publication of US8844023B2 publication Critical patent/US8844023B2/en
Application granted granted Critical
Assigned to U.S. BANK NATIONAL ASSOCIATION, AS COLLATERAL AGENT reassignment U.S. BANK NATIONAL ASSOCIATION, AS COLLATERAL AGENT SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: MICRON TECHNOLOGY, INC.
Assigned to MORGAN STANLEY SENIOR FUNDING, INC., AS COLLATERAL AGENT reassignment MORGAN STANLEY SENIOR FUNDING, INC., AS COLLATERAL AGENT PATENT SECURITY AGREEMENT Assignors: MICRON TECHNOLOGY, INC.
Assigned to U.S. BANK NATIONAL ASSOCIATION, AS COLLATERAL AGENT reassignment U.S. BANK NATIONAL ASSOCIATION, AS COLLATERAL AGENT CORRECTIVE ASSIGNMENT TO CORRECT THE REPLACE ERRONEOUSLY FILED PATENT #7358718 WITH THE CORRECT PATENT #7358178 PREVIOUSLY RECORDED ON REEL 038669 FRAME 0001. ASSIGNOR(S) HEREBY CONFIRMS THE SECURITY INTEREST. Assignors: MICRON TECHNOLOGY, INC.
Assigned to JPMORGAN CHASE BANK, N.A., AS COLLATERAL AGENT reassignment JPMORGAN CHASE BANK, N.A., AS COLLATERAL AGENT SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: MICRON SEMICONDUCTOR PRODUCTS, INC., MICRON TECHNOLOGY, INC.
Assigned to MICRON TECHNOLOGY, INC. reassignment MICRON TECHNOLOGY, INC. RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS). Assignors: U.S. BANK NATIONAL ASSOCIATION, AS COLLATERAL AGENT
Assigned to MICRON TECHNOLOGY, INC. reassignment MICRON TECHNOLOGY, INC. RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS). Assignors: MORGAN STANLEY SENIOR FUNDING, INC., AS COLLATERAL AGENT
Assigned to MICRON TECHNOLOGY, INC., MICRON SEMICONDUCTOR PRODUCTS, INC. reassignment MICRON TECHNOLOGY, INC. RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS). Assignors: JPMORGAN CHASE BANK, N.A., AS COLLATERAL AGENT
Active legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/79Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/14Protection against unauthorised use of memory or access to memory
    • G06F12/1416Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights
    • G06F12/1425Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights the protection being physical, e.g. cell, word, block
    • G06F12/1433Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights the protection being physical, e.g. cell, word, block for a module or a part of a module
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/74Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11CSTATIC STORES
    • G11C29/00Checking stores for correct operation ; Subsequent repair; Testing stores during standby or offline operation
    • G11C29/04Detection or location of defective memory elements, e.g. cell constructio details, timing of test signals
    • G11C29/08Functional testing, e.g. testing during refresh, power-on self testing [POST] or distributed testing
    • G11C29/12Built-in arrangements for testing, e.g. built-in self testing [BIST] or interconnection details
    • G11C29/46Test trigger logic
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11CSTATIC STORES
    • G11C7/00Arrangements for writing information into, or reading information out from, a digital store
    • G11C7/24Memory cell safety or protection circuits, e.g. arrangements for preventing inadvertent reading or writing; Status cells; Test cells
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2105Dual mode as a secondary aspect

Definitions

  • This relates to semiconductor memories.
  • Semiconductor memories such as flash memories, may include a built-in test mode.
  • the built-in test mode may be utilized by the manufacturer to conduct tests prior to distribution of the product.
  • the built-in test mode may also be utilized subsequently, upon return of the part to the manufacturer, to analyze product failures.
  • the built-in test mode may be implemented by writing parameters to a test mode decoder to facilitate certain operative tests. These tests are generally run in what is called an engineering work station which has a receptacle for receiving the memories under test and for applying test parameters to those memories. The engineering work station also collects the results of the tests and provides the analysis of the results in order to determine whether the parts are operating correctly.
  • FIG. 1 is a schematic depiction of one embodiment of the present invention
  • FIG. 2 is a test set up according to one embodiment
  • FIG. 3 is a flow chart for a set up flow in accordance with one embodiment of the present invention.
  • FIG. 4 is a flow chart for a built-in test mode in accordance with one embodiment of the present invention.
  • a built-in test mode may be accessed after manufacture only through a password protected scheme. Basically, after manufacturing and delivery of the memory to the customer, the customer may program a password into the memory. That password controls access to the built-in test mode thereafter.
  • the manufacturer can only access the built-in test mode if the manufacturer receives, from the customer, the password needed to access the built-in test mode.
  • the customer upon purchasing the device, the customer can write a password which controls built-in test mode access thereafter.
  • the manufacturer and all other users of the memory would have no idea what the password is and, therefore, could not access the built-in test mode.
  • Embodiments may be utilized in a variety of semiconductor memories including volatile and non-volatile memories.
  • semiconductor memories including volatile and non-volatile memories.
  • EEPROMs electrically erasable programmable read-only memories
  • flash memories including both NOR and NAND flash
  • phase change memories including both NOR and NAND flash
  • dynamic random access memories including both NOR and NAND flash
  • static random access memories may be used, to mention a few examples.
  • an integrated semiconductor memory 10 may include a memory controller 12 coupled to a memory array 16 .
  • the memory array 16 may include rows and columns of cells that may be addressed in a variety of different fashions to either program information into the cell or to access information already programmed in the cell.
  • the memory array 16 may be accessed by a memory controller 12 which, in some embodiments, may be part of an integrated semiconductor memory 10 .
  • the memory controller 12 may also be accessed by test mode decoder 14 .
  • the test mode decoder 14 or test mode interface allows access to built-in test modes controlled by the memory controller 12 . Alternatively, the test mode may be entered by forcing an internal signal to change from the normal operating mode.
  • a configuration memory 17 that may be external to the array 16 , may store information about the configuration of the memory 10 .
  • the memory 17 may be a non-volatile memory.
  • a random number generator 19 may generate a random number used by the customer to encrypt a password.
  • the configuration memory 17 may be programmed also with a special key, such as a double word password.
  • a special key such as a double word password.
  • the password programming can be checked by the device at power on to be sure that the device is correctly configured, that the password was written, and the test mode access configuration is also valid. This check may be necessary because after the integrated circuit is fabricated, the manufacturer cannot know the configuration of the device that might possibly be test mode password protected with an unknown password. If a complicated and longer key is also stored in a special part of the configuration memory 17 , the probability of having a non-accessible device is very low.
  • the users of the memory 10 may access the built-in test mode by writing to registers of the configuration memory 17 (also called a POR sector).
  • the configuration memory 17 stores configuration information for the memory.
  • the configuration memory 17 may also store the information needed to access the built-in test mode after the password has been programmed.
  • the test mode decoder 14 may, in some embodiments, also store a test mode sequence 24 that implements the test mode and a test mode set up sequence 18 .
  • the sequences 18 and 24 may be software executed by a processor-based system such as the controller 12 or the decoder 14 . Alternatively, the sequences may be implemented in hardware or firmware.
  • the memory 10 may be coupled to a test apparatus 46 that applies test signals to the memory 10 under test (MUT), as shown in FIG. 2 .
  • the test apparatus 46 is coupled to a test processor 44 that includes storage 42 .
  • User access to the test processor 44 is gained through the engineering work station (EWS) 40 using an EWS flow to configure and test the memory from the fab.
  • EWS engineering work station
  • the various parameters to set up the configuration of the memory 10 may be programmed, as indicated in block 20 in FIG. 3 .
  • password protection may be enabled, for example, by writing a double word to the configuration memory 17 .
  • a flag is set that thereafter results in the requirement for the provision of a password to use the test mode.
  • subsequent accesses to the test mode require provision of a password.
  • a check at diamond 26 in FIG. 4 determines whether the flag has been set and the device is password enabled. If not, the flow continues normally. Otherwise, a check determines whether the correct password was entered, as indicated in block 28 . In other words, the user password must be provided in order to access the test mode. If the password is not provided, no further progress of the flow may be allowed in some embodiments. If the password that is provided checks out when compared to the password stored in the configuration memory 17 , then test mode access is allowed.
  • the various parameters to implement the test mode may then be received, as indicated in block 30 . These parameters provide the tests that will be implemented and the data that is necessary to implement the tests, as is conventional in built-in test mode sequences.
  • the memory 10 is thereafter no longer password protected. In other words, once the password is received, the password protection feature is effectively disabled.
  • a more elaborate encryption technique may be utilized. Basically, a random number may be used to further encrypt the password.
  • a function may be defined that sets an encrypted code. The encrypted code is a function of a random number generated by the memory and the password established by the customer.
  • the manufacturer obtains the random number from a random number generator on board the memory.
  • the manufacturer then sends the random number to the customer.
  • the customer forwards a password encypted with the random number.
  • the manufacturer can then access to the test mode of the device using the encoded password.
  • the manufacturer may, in some embodiments, reset the test mode protection and may not need the password thereafter.
  • the customer may grant the manufacturer access to the test mode by giving a password to the manufacturer.
  • the manufacturer in some cases, may have to calculate an unlock key, which is a function of the password in a random number. In this way, the customer may keep the password secret by only giving the encrypted password.
  • the customer may use a random number generated by the device to encrypt the password. Where the password is different from device-to-device, it may not matter that the manufacturer gains access to the password and, therefore, the simpler technique may be utilized.
  • references throughout this specification to “one embodiment” or “an embodiment” mean that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one implementation encompassed within the present invention. Thus, appearances of the phrase “one embodiment” or “in an embodiment” are not necessarily referring to the same embodiment. Furthermore, the particular features, structures, or characteristics may be instituted in other suitable forms other than the particular embodiment illustrated and all such forms may be encompassed within the claims of the present application.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Mathematical Physics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

A semiconductor memory may be provided with a built-in test mode that is accessible through a password protection scheme. This enables access to a built-in test mode after manufacturing, if desired. At the same time, the password protection prevents use of the built-in test mode to bypass security features of the memory.

Description

BACKGROUND
This relates to semiconductor memories.
Semiconductor memories, such as flash memories, may include a built-in test mode. The built-in test mode may be utilized by the manufacturer to conduct tests prior to distribution of the product. The built-in test mode may also be utilized subsequently, upon return of the part to the manufacturer, to analyze product failures.
Generally, the built-in test mode may be implemented by writing parameters to a test mode decoder to facilitate certain operative tests. These tests are generally run in what is called an engineering work station which has a receptacle for receiving the memories under test and for applying test parameters to those memories. The engineering work station also collects the results of the tests and provides the analysis of the results in order to determine whether the parts are operating correctly.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 is a schematic depiction of one embodiment of the present invention;
FIG. 2 is a test set up according to one embodiment;
FIG. 3 is a flow chart for a set up flow in accordance with one embodiment of the present invention; and
FIG. 4 is a flow chart for a built-in test mode in accordance with one embodiment of the present invention.
DETAILED DESCRIPTION
In accordance with some embodiments, a built-in test mode may be accessed after manufacture only through a password protected scheme. Basically, after manufacturing and delivery of the memory to the customer, the customer may program a password into the memory. That password controls access to the built-in test mode thereafter.
Then, when a product is returned to the manufacturer, the manufacturer can only access the built-in test mode if the manufacturer receives, from the customer, the password needed to access the built-in test mode.
Thus, upon purchasing the device, the customer can write a password which controls built-in test mode access thereafter. The manufacturer and all other users of the memory would have no idea what the password is and, therefore, could not access the built-in test mode.
It may be desirable to control access to the built-in test mode because security features of the memory might be bypassed through the built-in test mode. Nonetheless, it may still be desirable to enable use of the built-in test mode, upon password access, for example, to allow the manufacturer to analyze why parts were working improperly.
Embodiments may be utilized in a variety of semiconductor memories including volatile and non-volatile memories. For example, electrically erasable programmable read-only memories (EEPROMs), flash memories, including both NOR and NAND flash, phase change memories, dynamic random access memories, and static random access memories may be used, to mention a few examples.
Referring to FIG. 1, an integrated semiconductor memory 10 may include a memory controller 12 coupled to a memory array 16. Conventionally, the memory array 16 may include rows and columns of cells that may be addressed in a variety of different fashions to either program information into the cell or to access information already programmed in the cell.
The memory array 16 may be accessed by a memory controller 12 which, in some embodiments, may be part of an integrated semiconductor memory 10. The memory controller 12 may also be accessed by test mode decoder 14. The test mode decoder 14 or test mode interface allows access to built-in test modes controlled by the memory controller 12. Alternatively, the test mode may be entered by forcing an internal signal to change from the normal operating mode. A configuration memory 17 that may be external to the array 16, may store information about the configuration of the memory 10. The memory 17 may be a non-volatile memory. A random number generator 19 may generate a random number used by the customer to encrypt a password.
In accordance with some embodiments, the configuration memory 17 may be programmed also with a special key, such as a double word password. The password programming can be checked by the device at power on to be sure that the device is correctly configured, that the password was written, and the test mode access configuration is also valid. This check may be necessary because after the integrated circuit is fabricated, the manufacturer cannot know the configuration of the device that might possibly be test mode password protected with an unknown password. If a complicated and longer key is also stored in a special part of the configuration memory 17, the probability of having a non-accessible device is very low.
Conventionally, the users of the memory 10 may access the built-in test mode by writing to registers of the configuration memory 17 (also called a POR sector). The configuration memory 17 stores configuration information for the memory. The configuration memory 17 may also store the information needed to access the built-in test mode after the password has been programmed.
The test mode decoder 14 may, in some embodiments, also store a test mode sequence 24 that implements the test mode and a test mode set up sequence 18. The sequences 18 and 24 may be software executed by a processor-based system such as the controller 12 or the decoder 14. Alternatively, the sequences may be implemented in hardware or firmware.
Conventionally, the memory 10 may be coupled to a test apparatus 46 that applies test signals to the memory 10 under test (MUT), as shown in FIG. 2. The test apparatus 46 is coupled to a test processor 44 that includes storage 42. User access to the test processor 44 is gained through the engineering work station (EWS) 40 using an EWS flow to configure and test the memory from the fab.
In the set up sequence 18, the various parameters to set up the configuration of the memory 10 may be programmed, as indicated in block 20 in FIG. 3. In addition, password protection may be enabled, for example, by writing a double word to the configuration memory 17. After programming the password, as indicated in block 22, a flag is set that thereafter results in the requirement for the provision of a password to use the test mode. Thus, in some embodiments, after the set up sequence 18 is implemented, if the flag is set, subsequent accesses to the test mode require provision of a password.
Then, to implement the test mode, a check at diamond 26 in FIG. 4 determines whether the flag has been set and the device is password enabled. If not, the flow continues normally. Otherwise, a check determines whether the correct password was entered, as indicated in block 28. In other words, the user password must be provided in order to access the test mode. If the password is not provided, no further progress of the flow may be allowed in some embodiments. If the password that is provided checks out when compared to the password stored in the configuration memory 17, then test mode access is allowed.
If the password is provided or the device is not password enabled, the various parameters to implement the test mode may then be received, as indicated in block 30. These parameters provide the tests that will be implemented and the data that is necessary to implement the tests, as is conventional in built-in test mode sequences.
In some embodiments, once the password has been provided, the memory 10 is thereafter no longer password protected. In other words, once the password is received, the password protection feature is effectively disabled. In some embodiments, a more elaborate encryption technique may be utilized. Basically, a random number may be used to further encrypt the password. A function may be defined that sets an encrypted code. The encrypted code is a function of a random number generated by the memory and the password established by the customer.
Then, when the manufacturer needs to access the device, the manufacturer obtains the random number from a random number generator on board the memory. The manufacturer then sends the random number to the customer. The customer forwards a password encypted with the random number. The manufacturer can then access to the test mode of the device using the encoded password. The manufacturer may, in some embodiments, reset the test mode protection and may not need the password thereafter.
Thus, in some cases, the customer may grant the manufacturer access to the test mode by giving a password to the manufacturer. The manufacturer, in some cases, may have to calculate an unlock key, which is a function of the password in a random number. In this way, the customer may keep the password secret by only giving the encrypted password. In other cases, if the password is the same for all of the customer's devices, the customer may use a random number generated by the device to encrypt the password. Where the password is different from device-to-device, it may not matter that the manufacturer gains access to the password and, therefore, the simpler technique may be utilized.
However, in other cases, it may be possible to reinstitute the password or to institute a new password upon provision of the existing password.
References throughout this specification to “one embodiment” or “an embodiment” mean that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one implementation encompassed within the present invention. Thus, appearances of the phrase “one embodiment” or “in an embodiment” are not necessarily referring to the same embodiment. Furthermore, the particular features, structures, or characteristics may be instituted in other suitable forms other than the particular embodiment illustrated and all such forms may be encompassed within the claims of the present application.
While the present invention has been described with respect to a limited number of embodiments, those skilled in the art will appreciate numerous modifications and variations therefrom. It is intended that the appended claims cover all such modifications and variations as fall within the true spirit and scope of this present invention.

Claims (9)

What is claimed is:
1. An apparatus, comprising:
an integrated semiconductor memory, comprising:
a controller configured to control a built-in test mode;
a memory array coupled to said controller;
random number generator coupled to said controller and configured to provide a random number; and
a test mode decoder coupled to said controller and said random number generator and configured to store a test mode sequence for implementing the built-in test mode and a test mode set-up sequence for configuring a password of the integrated semiconductor memory, said test mode decoder configured to implement a password protection access to said built-in test mode based on the password and the random number.
2. The apparatus of claim 1 wherein said password protected access is selectively implementable.
3. The apparatus of claim 1 wherein said integrated semiconductor memory is a flash memory.
4. The apparatus of claim 1, wherein the integrated semiconductor memory further comprises a configuration memory configured to store the password, said configuration memory external to said memory array.
5. An apparatus, comprising:
an integrated semiconductor memory device comprising:
a memory array;
a random number generator configured to provide a random number;
a test mode decoder coupled to the random number generator and configured to store a test mode sequence for implementing a built-in test mode and a test mode set-up sequence for configuring a password of the integrated semiconductor memory device, said test mode decoder configured to selectively implement a password protected access to said built-in test mode for said integrated semiconductor memory device using a code derived from the password and the random number.
6. The apparatus of claim 5, further comprising a configuration memory external from said array to store the password.
7. The apparatus of claim 5, further comprising a controller configured to control said built-in test mode.
8. The apparatus of claim 5, further comprising a memory controller coupled to said memory array.
9. The apparatus of claim 8, wherein said test mode decoder is included in said memory controller.
US12/326,165 2008-12-02 2008-12-02 Password protected built-in test mode for memories Active 2030-11-15 US8844023B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US12/326,165 US8844023B2 (en) 2008-12-02 2008-12-02 Password protected built-in test mode for memories

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US12/326,165 US8844023B2 (en) 2008-12-02 2008-12-02 Password protected built-in test mode for memories

Publications (2)

Publication Number Publication Date
US20100138915A1 US20100138915A1 (en) 2010-06-03
US8844023B2 true US8844023B2 (en) 2014-09-23

Family

ID=42223984

Family Applications (1)

Application Number Title Priority Date Filing Date
US12/326,165 Active 2030-11-15 US8844023B2 (en) 2008-12-02 2008-12-02 Password protected built-in test mode for memories

Country Status (1)

Country Link
US (1) US8844023B2 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105843112B (en) * 2016-03-15 2018-07-13 珠海格力电器股份有限公司 MCU, terminal and control method

Citations (36)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4310720A (en) * 1978-03-31 1982-01-12 Pitney Bowes Inc. Computer accessing system
US4882752A (en) * 1986-06-25 1989-11-21 Lindman Richard S Computer security system
US5210571A (en) * 1991-09-26 1993-05-11 Xerox Corporation System for servicing electronic printers and printing systems
US5388156A (en) * 1992-02-26 1995-02-07 International Business Machines Corp. Personal computer system with security features and method
US5506396A (en) * 1993-02-09 1996-04-09 Mitsubishi Denki Kabushiki Kaisha Microcomputer for IC card
US5719387A (en) * 1995-03-29 1998-02-17 Mitsubishi Denki Kabushiki Kaisha IC card including a memory, a password collating means and an access permitting means for permitting access to the memory
US6085337A (en) * 1998-09-21 2000-07-04 Infineon Technologies North America Corp. Method and system for reliably indicating test results during a self-check operation
US6094724A (en) * 1997-11-26 2000-07-25 Atmel Corporation Secure memory having anti-wire tapping
US6401198B1 (en) * 1999-03-09 2002-06-04 Texas Instruments Incorporated Storing system-level mass storage configuration data in non-volatile memory on each mass storage device to allow for reboot/power-on reconfiguration of all installed mass storage devices to the same configuration as last use
US20030018939A1 (en) * 2001-07-19 2003-01-23 Mitsubishi Denki Kabushiki Kaisha Test circuit capable of testing embedded memory with reliability
US20030084307A1 (en) * 2001-10-30 2003-05-01 Schwartz Jeffrey D. Secure boot device selection method and system
US6681304B1 (en) * 2000-06-30 2004-01-20 Intel Corporation Method and device for providing hidden storage in non-volatile memory
US20040025027A1 (en) * 2002-07-30 2004-02-05 Eric Balard Secure protection method for access to protected resources in a processor
US20040071028A1 (en) * 2002-05-31 2004-04-15 Stmicroelectronics S.R.L. Testing method and device for non-volatile memories having a LPC (low pin count) communication serial interface
US6731536B1 (en) * 2001-03-05 2004-05-04 Advanced Micro Devices, Inc. Password and dynamic protection of flash memory data
US20050044222A1 (en) * 2003-06-26 2005-02-24 Kazuma Sekiya Method of exchanging test processing information
US6892322B1 (en) * 2000-10-26 2005-05-10 Cypress Semiconductor Corporation Method for applying instructions to microprocessor in test mode
US20050229065A1 (en) * 2004-04-01 2005-10-13 Yasukazu Kai Semiconductor integrated ciruit which properly executes an operational test of a circuit under test in the semiconductor integrated circuit
US20060059398A1 (en) * 2004-09-10 2006-03-16 Chang Young-Uk Generation of test mode signals in memory device with minimized wiring
US20060161725A1 (en) * 2005-01-20 2006-07-20 Lee Charles C Multiple function flash memory system
US7099906B2 (en) * 2001-10-12 2006-08-29 Stmicroelectronics, S.R.L. Random bit sequence generator
US20060282734A1 (en) * 2005-05-23 2006-12-14 Arm Limited Test access control for secure integrated circuits
US20070192828A1 (en) * 2005-01-19 2007-08-16 Stmicroelectronics S.R.L. Enhanced security memory access method and architecture
US20080147964A1 (en) * 2004-02-26 2008-06-19 Chow David Q Using various flash memory cells to build usb data flash cards with multiple partitions and autorun function
US7395434B2 (en) * 2002-05-01 2008-07-01 Hewlett-Packard Development Company, L.P. Method for secure storage and verification of the administrator, power-on password and configuration information
US7441169B2 (en) * 2002-12-16 2008-10-21 Renesas Technology Corp. Semiconductor integrated circuit with test circuit
US7519873B2 (en) * 2004-06-11 2009-04-14 Samsung Electronics Co., Ltd. Methods and apparatus for interfacing between test system and memory
US20090125683A1 (en) * 2005-11-07 2009-05-14 Satoshi Okamoto Portable auxiliary storage device
US20090307502A1 (en) * 2008-06-04 2009-12-10 Ati Technologies Ulc Method and apparatus for securing digital information on an integrated circuit read only memory during test operating modes
US20090307411A1 (en) * 2008-06-04 2009-12-10 Ati Technologies Ulc Method and apparatus for securing digital information on an integrated circuit during test operating modes
US20100043078A1 (en) * 2004-02-23 2010-02-18 Lexar Media, Inc. Secure compact flash
US7702984B1 (en) * 2000-01-06 2010-04-20 Super Talent Electronics, Inc. High volume testing for USB electronic data flash cards
US7730368B2 (en) * 2003-10-31 2010-06-01 Sandisk Il Ltd. Method, system and computer-readable code for testing of flash memory
US7788553B2 (en) * 2000-01-06 2010-08-31 Super Talent Electronics, Inc. Mass production testing of USB flash cards with various flash memory cells
US7873837B1 (en) * 2000-01-06 2011-01-18 Super Talent Electronics, Inc. Data security for electronic data flash card
US20110068907A1 (en) * 2005-04-25 2011-03-24 Seung Hyup Ryoo Reader control system

Patent Citations (39)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4310720A (en) * 1978-03-31 1982-01-12 Pitney Bowes Inc. Computer accessing system
US4882752A (en) * 1986-06-25 1989-11-21 Lindman Richard S Computer security system
US5210571A (en) * 1991-09-26 1993-05-11 Xerox Corporation System for servicing electronic printers and printing systems
US5388156A (en) * 1992-02-26 1995-02-07 International Business Machines Corp. Personal computer system with security features and method
US5506396A (en) * 1993-02-09 1996-04-09 Mitsubishi Denki Kabushiki Kaisha Microcomputer for IC card
US5719387A (en) * 1995-03-29 1998-02-17 Mitsubishi Denki Kabushiki Kaisha IC card including a memory, a password collating means and an access permitting means for permitting access to the memory
US6094724A (en) * 1997-11-26 2000-07-25 Atmel Corporation Secure memory having anti-wire tapping
US6085337A (en) * 1998-09-21 2000-07-04 Infineon Technologies North America Corp. Method and system for reliably indicating test results during a self-check operation
US6401198B1 (en) * 1999-03-09 2002-06-04 Texas Instruments Incorporated Storing system-level mass storage configuration data in non-volatile memory on each mass storage device to allow for reboot/power-on reconfiguration of all installed mass storage devices to the same configuration as last use
US7873837B1 (en) * 2000-01-06 2011-01-18 Super Talent Electronics, Inc. Data security for electronic data flash card
US7702984B1 (en) * 2000-01-06 2010-04-20 Super Talent Electronics, Inc. High volume testing for USB electronic data flash cards
US7788553B2 (en) * 2000-01-06 2010-08-31 Super Talent Electronics, Inc. Mass production testing of USB flash cards with various flash memory cells
US6681304B1 (en) * 2000-06-30 2004-01-20 Intel Corporation Method and device for providing hidden storage in non-volatile memory
US6892322B1 (en) * 2000-10-26 2005-05-10 Cypress Semiconductor Corporation Method for applying instructions to microprocessor in test mode
US6731536B1 (en) * 2001-03-05 2004-05-04 Advanced Micro Devices, Inc. Password and dynamic protection of flash memory data
US20030018939A1 (en) * 2001-07-19 2003-01-23 Mitsubishi Denki Kabushiki Kaisha Test circuit capable of testing embedded memory with reliability
US7099906B2 (en) * 2001-10-12 2006-08-29 Stmicroelectronics, S.R.L. Random bit sequence generator
US20030084307A1 (en) * 2001-10-30 2003-05-01 Schwartz Jeffrey D. Secure boot device selection method and system
US7395434B2 (en) * 2002-05-01 2008-07-01 Hewlett-Packard Development Company, L.P. Method for secure storage and verification of the administrator, power-on password and configuration information
US20040071028A1 (en) * 2002-05-31 2004-04-15 Stmicroelectronics S.R.L. Testing method and device for non-volatile memories having a LPC (low pin count) communication serial interface
US20040025027A1 (en) * 2002-07-30 2004-02-05 Eric Balard Secure protection method for access to protected resources in a processor
US7441169B2 (en) * 2002-12-16 2008-10-21 Renesas Technology Corp. Semiconductor integrated circuit with test circuit
US20050044222A1 (en) * 2003-06-26 2005-02-24 Kazuma Sekiya Method of exchanging test processing information
US7730368B2 (en) * 2003-10-31 2010-06-01 Sandisk Il Ltd. Method, system and computer-readable code for testing of flash memory
US20100043078A1 (en) * 2004-02-23 2010-02-18 Lexar Media, Inc. Secure compact flash
US20080147964A1 (en) * 2004-02-26 2008-06-19 Chow David Q Using various flash memory cells to build usb data flash cards with multiple partitions and autorun function
US20050229065A1 (en) * 2004-04-01 2005-10-13 Yasukazu Kai Semiconductor integrated ciruit which properly executes an operational test of a circuit under test in the semiconductor integrated circuit
US7519873B2 (en) * 2004-06-11 2009-04-14 Samsung Electronics Co., Ltd. Methods and apparatus for interfacing between test system and memory
US20060059398A1 (en) * 2004-09-10 2006-03-16 Chang Young-Uk Generation of test mode signals in memory device with minimized wiring
US20080189557A1 (en) * 2005-01-19 2008-08-07 Stmicroelectronics S.R.I. Method and architecture for restricting access to a memory device
US20070192828A1 (en) * 2005-01-19 2007-08-16 Stmicroelectronics S.R.L. Enhanced security memory access method and architecture
US8276185B2 (en) * 2005-01-19 2012-09-25 Micron Technology, Inc. Enhanced security memory access method and architecture
US20130014215A1 (en) * 2005-01-19 2013-01-10 Marco Messina Security memory access method and apparatus
US20060161725A1 (en) * 2005-01-20 2006-07-20 Lee Charles C Multiple function flash memory system
US20110068907A1 (en) * 2005-04-25 2011-03-24 Seung Hyup Ryoo Reader control system
US20060282734A1 (en) * 2005-05-23 2006-12-14 Arm Limited Test access control for secure integrated circuits
US20090125683A1 (en) * 2005-11-07 2009-05-14 Satoshi Okamoto Portable auxiliary storage device
US20090307502A1 (en) * 2008-06-04 2009-12-10 Ati Technologies Ulc Method and apparatus for securing digital information on an integrated circuit read only memory during test operating modes
US20090307411A1 (en) * 2008-06-04 2009-12-10 Ati Technologies Ulc Method and apparatus for securing digital information on an integrated circuit during test operating modes

Also Published As

Publication number Publication date
US20100138915A1 (en) 2010-06-03

Similar Documents

Publication Publication Date Title
US8776174B2 (en) Security memory access method and apparatus
US8659969B2 (en) Semiconductor device
US9037824B2 (en) Password accessible microelectronic memory
JP2020537280A (en) Hacking prevention mechanism for flash memory devices
US9378157B2 (en) Security memory access method and apparatus
US20220012374A1 (en) Semiconductor device with secure access key and associated methods and systems
US9653004B2 (en) Systems and methods for downloading code and data into a secure non-volatile memory
US9076507B2 (en) Nonvolatile memory and method of operating nonvolatile memory
US9471812B2 (en) Method for implementing security of non-volatile memory
US20220155978A1 (en) Unauthorized memory access mitigation
KR102500058B1 (en) Semiconductor device with secure access key and related method and system
EP4055508A1 (en) Semiconductor device with secure access key and associated methods and systems
EP1687827A1 (en) Embedded memory with security row lock protection
US8045381B2 (en) Device for protecting a memory against attacks by error injection
US8844023B2 (en) Password protected built-in test mode for memories
US20160021073A1 (en) Secure spin torque transfer magnetic random access memory (sttmram)
US8380918B2 (en) Non-volatile storage alteration tracking
JP6281027B1 (en) Flash memory device configurable to provide read-only memory functionality
KR20150101232A (en) Method of operating storage device including nonvolatile memory and memory controller
US20090049543A1 (en) Method for booting and protecting data in hard disk of computer system and module for protecting data thereof
US7730272B2 (en) Non-volatile memory device and method of encrypting data in the same
JP2002007372A (en) Semiconductor device
JP2004185670A (en) Nonvolatile semiconductor storage device and semiconductor device

Legal Events

Date Code Title Description
AS Assignment

Owner name: NUMONYX B.V.,SWITZERLAND

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:LA MALFA, ANTONINO;MESSINA, MARCO;REEL/FRAME:024601/0517

Effective date: 20081122

Owner name: NUMONYX B.V., SWITZERLAND

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:LA MALFA, ANTONINO;MESSINA, MARCO;REEL/FRAME:024601/0517

Effective date: 20081122

AS Assignment

Owner name: MICRON TECHNOLOGY, INC., IDAHO

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:NUMONYX B.V.;REEL/FRAME:027075/0682

Effective date: 20110930

AS Assignment

Owner name: MICRON TECHNOLOGY, INC., IDAHO

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:NUMONYX B.V.;REEL/FRAME:027126/0176

Effective date: 20110930

FEPP Fee payment procedure

Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STCF Information on status: patent grant

Free format text: PATENTED CASE

AS Assignment

Owner name: U.S. BANK NATIONAL ASSOCIATION, AS COLLATERAL AGENT, CALIFORNIA

Free format text: SECURITY INTEREST;ASSIGNOR:MICRON TECHNOLOGY, INC.;REEL/FRAME:038669/0001

Effective date: 20160426

Owner name: U.S. BANK NATIONAL ASSOCIATION, AS COLLATERAL AGEN

Free format text: SECURITY INTEREST;ASSIGNOR:MICRON TECHNOLOGY, INC.;REEL/FRAME:038669/0001

Effective date: 20160426

AS Assignment

Owner name: MORGAN STANLEY SENIOR FUNDING, INC., AS COLLATERAL AGENT, MARYLAND

Free format text: PATENT SECURITY AGREEMENT;ASSIGNOR:MICRON TECHNOLOGY, INC.;REEL/FRAME:038954/0001

Effective date: 20160426

Owner name: MORGAN STANLEY SENIOR FUNDING, INC., AS COLLATERAL

Free format text: PATENT SECURITY AGREEMENT;ASSIGNOR:MICRON TECHNOLOGY, INC.;REEL/FRAME:038954/0001

Effective date: 20160426

AS Assignment

Owner name: U.S. BANK NATIONAL ASSOCIATION, AS COLLATERAL AGENT, CALIFORNIA

Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE REPLACE ERRONEOUSLY FILED PATENT #7358718 WITH THE CORRECT PATENT #7358178 PREVIOUSLY RECORDED ON REEL 038669 FRAME 0001. ASSIGNOR(S) HEREBY CONFIRMS THE SECURITY INTEREST;ASSIGNOR:MICRON TECHNOLOGY, INC.;REEL/FRAME:043079/0001

Effective date: 20160426

Owner name: U.S. BANK NATIONAL ASSOCIATION, AS COLLATERAL AGEN

Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE REPLACE ERRONEOUSLY FILED PATENT #7358718 WITH THE CORRECT PATENT #7358178 PREVIOUSLY RECORDED ON REEL 038669 FRAME 0001. ASSIGNOR(S) HEREBY CONFIRMS THE SECURITY INTEREST;ASSIGNOR:MICRON TECHNOLOGY, INC.;REEL/FRAME:043079/0001

Effective date: 20160426

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551)

Year of fee payment: 4

AS Assignment

Owner name: JPMORGAN CHASE BANK, N.A., AS COLLATERAL AGENT, ILLINOIS

Free format text: SECURITY INTEREST;ASSIGNORS:MICRON TECHNOLOGY, INC.;MICRON SEMICONDUCTOR PRODUCTS, INC.;REEL/FRAME:047540/0001

Effective date: 20180703

Owner name: JPMORGAN CHASE BANK, N.A., AS COLLATERAL AGENT, IL

Free format text: SECURITY INTEREST;ASSIGNORS:MICRON TECHNOLOGY, INC.;MICRON SEMICONDUCTOR PRODUCTS, INC.;REEL/FRAME:047540/0001

Effective date: 20180703

CC Certificate of correction
AS Assignment

Owner name: MICRON TECHNOLOGY, INC., IDAHO

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:U.S. BANK NATIONAL ASSOCIATION, AS COLLATERAL AGENT;REEL/FRAME:047243/0001

Effective date: 20180629

AS Assignment

Owner name: MICRON TECHNOLOGY, INC., IDAHO

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:MORGAN STANLEY SENIOR FUNDING, INC., AS COLLATERAL AGENT;REEL/FRAME:050937/0001

Effective date: 20190731

AS Assignment

Owner name: MICRON SEMICONDUCTOR PRODUCTS, INC., IDAHO

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:JPMORGAN CHASE BANK, N.A., AS COLLATERAL AGENT;REEL/FRAME:051028/0001

Effective date: 20190731

Owner name: MICRON TECHNOLOGY, INC., IDAHO

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:JPMORGAN CHASE BANK, N.A., AS COLLATERAL AGENT;REEL/FRAME:051028/0001

Effective date: 20190731

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 8